Which two regular user PATH assignments expose the user to a Trojan horse attack?
Which two regular user PATH assignments expose the user to a Trojan horse attack? (Choose two.)
What is true about the system administrator’s incident response tasks?
The system administrator finds a Trojaned login command using md5 and the Solaris Fingerprint Database. What is true about the system administrator’s incident response tasks?
Which setting in the /etc/system file limits the maximum number of user processes to 100 to prevent a user fro
Which setting in the /etc/system file limits the maximum number of user processes to 100 to prevent a user from executing a fork bomb on a system?
Which is uncharacteristic of a Trojan horse program used to escalate privileges?
Which is uncharacteristic of a Trojan horse program used to escalate privileges?
Which threat can be mitigated by setting the Open Boot PROM security mode to full?
Which threat can be mitigated by setting the Open Boot PROM security mode to full?
Which two services support TCP Wrappers by default in the Solaris 9 OE?
Which two services support TCP Wrappers by default in the Solaris 9 OE? (Choose two.)
Which command generates client key pairs and adds them to the $HOME/.ssh directory?
Which command generates client key pairs and adds them to the $HOME/.ssh directory?
Which cryptographic assurances are provided by SSL?
Which cryptographic assurances are provided by SSL?
Which is a public key encryption algorithm?
Which is a public key encryption algorithm?
Which two types of host keys are supported by Solaris Secure Shell?
Which two types of host keys are supported by Solaris Secure Shell? (Choose two.)